Error characteristics and their prediction in ZigBee transmission at coexistence conditions

Size: px
Start display at page:

Download "Error characteristics and their prediction in ZigBee transmission at coexistence conditions"

Transcription

1 Error characteristics and their prediction in ZigBee transmission at coexistence conditions BOHUSLAVEK ZDENEK and MASIK ILJA Department of Electrical Engineering and Automation, Faculty of Engineering Czech University of Life Sciences Prague, Kamycka 29 CZECH REPUBLIC Abstract: - Currently, the unlicensed ISM band (Industrial Scientific and Medical) 2.4 GHz is become saturated due many standards used at once. In agricultural production has ZigBee a lot of applications, from wireless sensors networks to complicated automation applications. This paper deals with improving the coexistence properties ZigBee (IEEE ), while keeping compatibility with the basic standard. This paper describes principles and application of forward error correction above the physical layer, consisting of block data interleaver and Hamming code, and also the effect of improvements in coexistence with variously loaded WiFi 802.g. Keywords: - dependability, Hamming, wireless, ZigBee Introduction Currently, the unlicensed ISM band (Industrial Scientific and Medical) 2.4 GHz become saturated due many standards used at once. Beginning WLAN networks (IEEE 802.b/g/n), through Personal Area Networks such as Bluetooth or ZigBee (IEEE , ) and last but not least, a lot of nonstandardized wireless transmi- ssions, such as wireless phones, PC peripherals etc. The coexistence of different wireless networks in the ISM band is inevitable, and it is also very probable that there will be a carrier frequencies overlapping. In agricultural production, as at any other area with people traffic, a lot of interference situations caused by mobile devices hanged by persons can occur. Mobile phones, tablets and etc. are very usual at present time and WiFi or Bluetooth are used very frequently. Method described by this paper, has been built for anemometer data logger units, used for parameters measurement of new type windbreak at Research Institute of Soil and Water Conservation. An anemometer data logger (with ZigBee wireless data download) has been positioned in the field with aim to get long term capabilities of windbreak units. When the data was downloaded, the collection unit has sometimes problems with interference from coexistent standards, caused by the equipment handled by the person who operates the collection unit. Aim of this paper is describe main characteristics for coexistence improvement. WiFi (802.) 802.g is currently being slowly replaced by 802.n, but is still very frequently used. Theoretical transfer speed of 802.g is 54 Mbit/s. Channels, their width, spacing and overlapping is identical with 802.b, but with increased throughput, which is achieved using the OFDM modulation. OFDM (Orthogonal Frequency Division Multiplex) is a method, which allows operation of adjacent channels with overlap, without causing interference. It is a method that allows better utilization of given range, which increases noise immunity against the simple data transmission. Given channel is divided into sub channels and these are used as parallel separate links of communication, of course, with lower throughput. 802.g allows channel width 22 MHz, divided into 52 subchannels, where 48 are data channels and 4 pilot channels used to synchronize transmission. In order of best band utilization, the channels are defined with an overlap. This overlap is then eliminated by orthogonality of adjacent frequencies. Therefore there no inter-channel interferences occur, because when one channel transmits a particular character, neighboring channels are E-ISSN: Volume 6, 207

2 zero. OFDM actually converts the serial data transmission to parallel information transfer. DSSS (Direct Sequence Spread Spectrum) method uses redundant data to spread information to the spectrum and thereby is increased interference resistance. In practice, bits to transmit are replaced by chip sequences longer than the original data. This causes to data redundancy, which can be used at the receiver side to correct errors resulting from noise in transmission channel. The 802.g standard allows the use of both OFDM and DSSS modulation. Fig. is a frame structure of 802.g, where in relation to coexistence between ZigBee and WiFi, is interesting timing. PLCP Preamble sequence is 6 µs long, followed by PLCP Header with 4 µs length independently on current transfer speed, after that follows the data. Timing of data part depends on the speed and coding rate, []. Fig. : Frame format of 802.g, [] ZigBee ( ) ZigBee is commercial wireless technology based on standard IEEE , which, like Bluetooth, belongs to the category of PAN networks. ZigBee can operate in three bands to ensure usability on a global scale. Namely it is band 868 MHz, 95 MHz and 2.4 GHz. Each band has different maximum baud rate, at 868 MHz its 20 kbit.s -, band 95 MHz 40 kbit.s - and for 2.4 GHz is the baud rate 250 kbit.s - [2]. ZigBee physical layer uses in order to increase the reliability of transmission the forward error correction DSSS, where each four bits to send are substituted with sequences of 32 chips. At this stage, the signal is transmitted with O-QPSK modulation, which allows sending four bits per symbol with symbol timing 6 μs. At the receiver, when O-QPSK demodulation is done, microcontroller will for each 32 chip sequence evaluate the probability of compliance with each of the 2 4 variants of 32 chip originals, and then replace with appropriate 4 information bits, based on the best fit. Instead of 4 bits, are transmitted 32, which mean the channel bandwidth is reduced to /8. The benefit is the ability to statistically detect and "fix", or rather "ignore" errors caused by noise in the transmission channel. The efficiency of these forward error correction, depends on the choice of chip sequences mainly is important their mutual dissimilarity. That determines the number of bit errors necessary for wrong substitution and consequential error, [3]. 2 Materials and Methods 2. Experimental hardware & software In development process was used hardware by Texas Instruments - SmartRF05 that uses SoC CC2530F256. This microcontroller has an integrated RF part directly on the chip, and therefore requires only a minimum of external components. ZigBee Stack in C language is provided by the microcontroller manufacturer. Method described below, was built on Z-stack version Stack is not completely editable, large part is prebuilt in libraries. The following method uses for data access at physical layer function "macmemreadrxfifo". 2.2 Hamming Code Following forward error correction method consists of two main parts, interleaver and Hamming encoder (7,4). Encoder and interleaver are included in the system to protect the transmitted data against bit errors. Hamming code falls into the category of selfcorrection codes, and it also belongs to the group of perfect codes, that means with the lowest possible redundancy. The algorithm generating and decoding parity bits, is easily implementable into 8-bit microcontroller. Encoding cycle costs are important especially in low power ZigBee wireless, because every incoming packet must be tested by FEC at receiving side. From this perspective Hamming code is most suitable candidate. The principle of a Hamming code (7,4) is assigned E-ISSN: Volume 6, 207

3 from three parity bits (see equation () (2) (3)) for every four bits protected. Parity bits are located at positions of second power,2,4), [5]. Calculation of parity bits can be written: p =b b 2 b 4 () p 2 =b b 3 b 4 (2) p 3 =b 2 b 3 b 4 (3) Where p, p 2, p 3 are parity bits, resulting from XOR addition of input bits b to b 4. Result is written in format: p p 2 b p 3 b 2 b 3 b 4 This 7-bit word allows recognize and correct one single error. The detecting calculation is based in following three equations: s =b b 2 b 4 p (4) s 2 =b b 3 b 4 p 2 (5) s 3 =b 2 b 3 b 4 p 3 (6) Where the vector consisting of bits (s, s2, s3) represents an Error syndrome. When the Error syndrome is zero, the code word contains no errors, or more than one error. If there is one error in transmission, error syndrome corresponds to position of fault bit, in [4]. It implies that when more than one error is given, the calculation may be correct, but the resulting syndrome does not correspond to reality. For this case can be used extended Hamming code (8,4). This algorithm assigns one more parity bit to check the whole word. Then you can still fix one error, but also another one error detect. Because following FEC method contains CRC, there is no reason to use this parity bit. 2.3 Block Interleaver PHY layer of ZigBee uses spread spectrum method - replacing each four data bits by 32 chips. If a sufficient amount of bit errors occurs in transmission, backward process will not be able to replace chips with correct data bits and cluster error will occur. More than two separate errors in distance n 7 affects wrong function of Hamming code. To prevent 2.4 Efficiency of Forward error correction above PHY Layer this case the Block data Interleaver is included in the processing. Block interleaver is used to increase the distance between incorrect bits. Interleaving goal is to change the distribution of errors in the data block, spread clusters of errors to discrete errors. Discrete errors in distance n>7 can be corrected by Hamming code, [4]. Interleaver is built from virtual table, where data are written in columns and output data is read by rows. Figure 2 shows the principle for interleaving 4x4. The numbers in cells indicates the sequence position of input bits. Fig. 2: Block interleaver matrix The design of interleaver is determined by ZigBee standard itself, and also from the measurement and simulation. Measurements shows that amount of the cluster highly depend on interfering element type, distance, and the signal strength. So chosen parameters of interleaver are not determined by measurement of cluster error rate only, but also with regard to the highest possible efficiency in the capabilities of ZigBee data packet and the acceptable load of the microcontroller. Size of the interleaver matrix was with respect to the maximum interleaving depth and a relatively large space in the data packets defined to 28 * 27. Matrix generates 756 bits, which corresponds to 08 code words of Hamming code. Final data capacity of one coded packet is 432 bits. Because this method is located above the physical layer, their impact doesn t cover all the transmission. To identify, which data can be covered by FEC (Fig. 3) and which can t, E-ISSN: Volume 6, 207

4 follows a transmission structure summary (Fig. 4) Figure 3: Scheme of FEC data connection Figure 4: Frame format of , in [3]. Frame begins by the Preamble, SoF delimiter and Frame length value, total of 48 bits which cannot be covered by provided forward error correction method, because it s given by Physical layer and cannot be changed without incompatibility issue. If the compatibility with other ZigBee nodes is important, MAC sublayer should be untouched too. Anyway, algorithm of this method shall decode all incoming packets, because alternative MAC header is included under FEC coding. That implies, that the MAC header is not important from perspective of probability of transmission at end point. Coded frames will be compatible with all other ZigBee nodes, they will be able to route this frames as any other. From this perspective only PHY header can t be covered by FEC and shall be error free in transmission. FEC method protection is 94% of PHY frame. If error occurs in covered part, MAC header or FCS, can be corrected, if error will occur in PHY header, frame will be lost. 2.5 Experimental measurement Aim of experiment was to verify efficiency of described method in increasing reliability of transmission. As experimental hardware was used Development boards Texas Instruments SmartRF05, where SoC microcontrollers CC2530F256 are used. These modules have output power 4.5 dbm and receiving sensitivity -97 dbm. Experimental network consist from Coordinator and Router nodes, where Coordinator was a transmitter and Router receiver. Software in modules was upgraded with described FEC method and measurement application. When network establishment was done, application in Coordinator starts sending predefined amount of coded frames to Router. A coded frame contains random data, generated for each frame separately and alternative 6 bit checksum in coded area. Router is decoding all incoming frames with correct frame length, and checks CRC value. If CRC value is correct, router increments amount of coded way received packet. Simultaneously, application counts all incoming data frames received by sublayers of Z-Stack. Flow chart E-ISSN: Volume 6, 207

5 of receiver application is described by Fig. 5. ZigBee network was established at channel. PHY Layer Interrupt PHY CRC (FCS) check YES Standard received frames count increment NO STOP STOP NO Decode CRC app check YES Coded frames count increment where each symbol means 6 bits. Symbol duration is 4 µs. Over ZigBee network, only one type of packet was transferred, namely 08 Bytes of total length (3 B of ZigBee sublayers and 95 B of Data). That implies, since the symbol duration is 6 µs and DSSS coding (4/32) is used, 27.6 ms for each frame. Measured distance PC m Fig. 5: Receiver application algorithm As coexistence partner was chosen WiFi 802.g link. This network was built from two main parts, WiFi Router US Robotics USR8054, and Tablet Samsung P30. Packets were generated by PC connected into Router by UTP cable at speed 00 Mbit.s -, and sent to IP address of tablet over WiFi. Various packet sizes, was generated by Nping software, where following setting was used: data-length X --delay 0 -c send-ip X parameter is length of user data, which was changed for each measurement. Wireless connection between Router and Tablet, was set to channel and connection speed 54 Mbit.s -. That implies, the Physical layer used 64-QAM modulation and data was coded with convolutional code in ¾ ratio. Data stream was sent through 48 subchannels, Fig. 6: Measurement equipment positioning ZigBee nodes were mounted on tripod.5 m above ground, in m distance. WiFi transceivers were in immediate distance, mounted on tripod in.5 m height. Distance between WiFi pair and ZigBee pair was gradually increased for each measurement. Distance was measured between ZigBee receiver and WiFi pair (Fig. 6). For each distance was sent defined amount of packets over ZigBee network, and registered values of correctly delivered packets on receiver. For each distance has been done five measurements and then was calculated PER value according to the equations (7) and (8). Measurement was repeated for various packet length transmitted over WiFi. PPPPPP ZZZZZZZZZZZZ = amount of received frames with correct CRC pp hyy total of sent frames PPPPPP ffffff = amount of received frames with correct CRC aaaaaa total of sent frames (7) (8) 2.6 Experiment Area Measurement was done in open area, where wasn t in 3 km radius no residential area or high-voltage lines. Before experiment was measured radio background level around ZigBee channel, result is shown on Fig. 7. Measurement was done with WiSpy spectrum analyzer and Chanalyzer Software. As can be E-ISSN: Volume 6, 207

6 seen on Fig. 7, noise level was under - 05 dbm. PER-fec Fig. 7: Radio background at experiment area 3 Results and Discussion Figure 8 shows results of coexistence measurement with length of WiFi packet 76B (3.2 µs). Mean time between WiFi packets was 3 ms. From this parameters can be deducted, that in each ZigBee packet (27.6 ms) 9 collisions with WiFi packet can occur. Each collision may take up to 3.3 µs. That implies, interference can persist for 3 consecutive ZigBee symbols (6 µs each). Three symbol errors can result into 2 mistaken chips in row, and it means cluster of errors in length of 8 bits. 0, Fig. 8: FEC effect when operating under WiFi 802.g coexistence and packet size 76 B Figure 9 shows effect of FEC under 802.g coexistence with packet size 88 B (47.9 µs). Mean time between WiFi packets was ms. Under this circumstances can occur an error in three consecutive ZigBee symbols like in previous case, maximum is 8 burst errors in a row. Due to packet spacing, can occurs 26 clusters in each ZigBee frame. PER-fec 0 0,5,5 2 Figure 9: FEC effect when operating under WiFi 802.g coexistence and packet size 88 B Figure 0 shows FEC impact when WiFi packet is set to 36 B (66.8 µs), and meant E-ISSN: Volume 6, 207

7 time between packets is ms. Compared to the previous case, now can be occurred 5 consequent ZigBee symbols, which is resulting into 20 wrong chips and, as before, two error clusters in a row. As before, interference can occur 26 times for each ZigBee frame. Figure 2 shows results with length of WiFi packet 532 B (247 µs) and mean time between packets 450 µs. Effect of FEC method under this coexistence variant is very low. Error can occur in 7 ZigBee symbols in a row, which means 68 chips and cluster of 2 bits. For each ZigBee frame can occur 40 collisions, 2 bits each maximum. PER-fec Figure 0: FEC effect when operating under WiFi 802.g coexistence and packet size 36 B Next case (Fig. ) shows FEC impact when WiFi packet length is set to 572 B (04.7 µs). At this time can be occurred 8 ZigBee symbols in a row, which means 32 chips, and again two clusters of errors with length 8 bits. As before, interference can occur 26 times for each ZigBee frame Fig. 2: FEC effect when operating under WiFi 802.g coexistence and packet size 532 B As can be seen at Figure 3, significant benefit of described FEC method, is when coexisting WiFi is lowly loaded, mainly with packets below 52 B of length. With interfering packets 36 B of length or lower, difference between standard ZigBee transfer and FEC covered method is at same conditions about ΔPER 0.6, that means the FEC packet error probability is 60% lower. PER Figure : FEC effect when operating under WiFi 802.g coexistence and packet size 572 B E-ISSN: Volume 6, 207

8 ΔPER(-) 0,7 0,6 0,5 0,4 0,3 P.L. 532 P.L. 872 P.L. 36 probability of successful transmission of 50-70% at same position. References 0,2 6E [] Institute of Electrical and Electronics Engineers, Inc., 2000) Part : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Higher- Speed Physical Layer Extension in the 2.4 GHz Band. New York: Institute of Electrical and Electronics Engineers, Inc.: 89. Fig. 3: Difference between standard ZigBee and FEC covered transmission 4 Conclusion Hamming code (7,4) has information rate 0.57, that results into decreasing of packet capacity from 95 B to 54 B. However, this amount shall be decreased for 2 Bytes of CRC and the same alternative address of destination or 2 Bytes, so the final frame capacity will be lowed of 7 Bytes (4 Bytes coded By Hamming code). That implies, that described Forward Error correction method decreases frame capacity of 50.5%. Experimental measurement in open area demonstrates benefits of this method under WiFi 802.g coexistence. When WiFi is loaded with shorter packet lengths, FEC method can increase [2] Gislason D., Zigbee Wireless Networking. Oxford, Newnes: 425. [3] Institute of Electrical and Electronics Engineers, Inc., Part 5.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Network (WPANs). New York: Institute of Electrical and Electronics Engineers, Inc.: 305. [4] Krivanek, V., Systémy realizace protichybového kódování (Systems design of correction coding). [Ph.D. Thesis.] Brno, Brno University of technology: -93. [5] Hamming R. W., 950. Error detecting and error correcting codes. The Bell System Technical Journal. 29: E-ISSN: Volume 6, 207

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Chapter 3.1 Acknowledgment:

Chapter 3.1 Acknowledgment: Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

Wireless LAN. Access Point. Provides network connectivity over wireless media

Wireless LAN. Access Point. Provides network connectivity over wireless media LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless

More information

Wireless LAN A competing method to wired LAN. Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu

Wireless LAN A competing method to wired LAN. Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu Wireless LAN A competing method to wired LAN Course: Wireline Communication Instructor: Prof. Werner Henkel Student: Chin Yung Lu Outline of the presentation Introduction Background Problem Environment

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

ZigBee/ David Sanchez Sanchez.

ZigBee/ David Sanchez Sanchez. ZigBee/802.15.4 David Sanchez Sanchez david.sanchezs@upf.edu Lecture Overview 1. Introduction and motivation to ZigBee 2. ZigBee/802.15.4 specification 1. Definitions 2. MAC communication modes 3. Network

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

By Nick Giannaris. ZigBee

By Nick Giannaris. ZigBee By Nick Giannaris ZigBee Personal Area Network (PAN) A computer network used for communication among devices in a close proximity. Wireless Personal Area Network (WPAN) A wireless personal area network

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, third floor Credits: 6 Standard Solutions Data-rate RFID 20 cm, 10-200 kbps 100m, 11-100 Mbps

More information

IEEE Romel Rudyard J. Lucentales, ECE 5

IEEE Romel Rudyard J. Lucentales, ECE 5 IEEE 802.11 Romel Rudyard J. Lucentales, ECE 5 IEEE 802.11 a set of standards for wireless local area network (WLAN) computer communication developed by the IEEE LAN/MAN Standards Committee (IEEE 802)

More information

COEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT

COEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT COEXISTENCE MODEL OF ZIGBEE& IEEE 802.11b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT Neha Gandotra, Vishwanath Bijalwan, Manohar Panwar Abstract IEEE 802.15.4 standard is used for low rate, short distance

More information

Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs.

Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs. Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs. Peer reviewed version Link to publication record in Explore Bristol

More information

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting

More information

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

Advanced Computer Networks. WLAN, Cellular Networks

Advanced Computer Networks. WLAN, Cellular Networks Advanced Computer Networks 263 3501 00 WLAN, Cellular Networks Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last week Medium Access COPE Today Last week Short

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 PLCP, Packet Format 2 PHY Layer Characteristics and Data Rates Area Concept Layers and Functions (PLCP and PMD Sublayers) Antennas DSSS in IEEE 802.11b

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards

More information

Investigation of WLAN

Investigation of WLAN Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved.

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved. WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput January 2009. All Rights Reserved. Contributed by WiMedia member company Abstract Today s wireless

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.

More information

ZIGBEE& IEEE b (WLAN) COEXISTENCE IN UBIQUITOUS NETWORK ENVIRONMENT

ZIGBEE& IEEE b (WLAN) COEXISTENCE IN UBIQUITOUS NETWORK ENVIRONMENT ZIGBEE& 802.11b (WLAN) COEXISTENCE IN UBIQUITOUS NETWORK ENVIRONMENT Meenu Balodhi 1, Vishwanath Bijalwan 2, Banit Negi 3 Abstract 802.15.4 standard is used for low rate, short distance wireless communication.

More information

Analysis of IEEE g standard for communication in a traffic lights distributed control system

Analysis of IEEE g standard for communication in a traffic lights distributed control system 2015 International Conference on Computational Science and Computational Intelligence Analysis of IEEE 802.11g standard for communication in a traffic lights distributed control system Danilo S. Miguel,

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

SDIO PRODUCT SPECIFICATION

SDIO PRODUCT SPECIFICATION SDIO PRODUCT SPECIFICATION IEEE 802.11 b/g/n 2.4GHz 1T1R WiFi Module JC-TSM89ES (Realtek RTL8189ES) Single Module Version 1.0 General Description The Realtek RTL8189ES is a highly integrated single-chip

More information

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE Wireless Technology AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. References 2 The physical layer provides mechanical, electrical, l functional,

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, third floor Credits: 6 Standard Solutions for Wireless Networks 2 Standard Solutions for WSN 3

More information

Modulation. Propagation. Typical frequency bands

Modulation. Propagation. Typical frequency bands References Wireless Technology 2 AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. The physical layer provides mechanical, electrical, l functional,

More information

On the Suitability of Bluetooth 5 for the Internet of Things: Performance and Scalability Analysis

On the Suitability of Bluetooth 5 for the Internet of Things: Performance and Scalability Analysis On the Suitability of Bluetooth 5 for the Internet of Things: Performance and Scalability Analysis Stefan Böcker, Christian Arendt, Christian Wietfeld TU Dortmund University, Germany Communication Networks

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

By N.Golmie Presented by: Sushanth Divvela

By N.Golmie Presented by: Sushanth Divvela By N.Golmie Presented by: Sushanth Divvela 1 Agenda Introduction WPAN WLAN Simulation Models Simulation results Concluding remarks 2 Introduc.on Coexistence of WPAN and WLAN Performance evaluation WLAN

More information

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding A Modified Medium Access Control Algorithm for Systems with Iterative Decoding Inkyu Lee Carl-Erik W. Sundberg Sunghyun Choi Dept. of Communications Eng. Korea University Seoul, Korea inkyu@korea.ac.kr

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

IEEE Testing Signal Compliance of ZigBee Standard

IEEE Testing Signal Compliance of ZigBee Standard IEEE802.15.4 Testing Signal Compliance of ZigBee Standard Tektronix 1 Agenda: 1: What is ZigBee 2: ZigBee Specification 3: ZigBee Signal Analysis 4: Demonstration for ZigBee analysis 2 What is ZigBee (1)

More information

Vehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

Vehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Vehicle Networks Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Outline Wireless LAN Overview History IEEE 802.11-1997 MAC implementations PHY implementations

More information

Reading. Read 3 MPLS links on the class website

Reading. Read 3 MPLS links on the class website Reading Read 3 MPLS links on the class website Read the following Wikipedia entries: Advanced Mobile Phone System, GSM, 1xEVDO, Cell site, Cellular network, 802.11ac Beyond IP Routing Traffic engineering

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Ch 7. Network Interface

Ch 7. Network Interface EE414 Embedded Systems Ch 7. Network Interface Part 1/2 Byung Kook Kim School of Electrical Engineering Korea Advanced Institute of Science and Technology Overview 7.1 Advanced Communication Principles

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs NT1210 Introduction to Networking Unit 6: Chapter 6, Wireless LANs Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks

More information

WIRELESS TECHNOLOGIES

WIRELESS TECHNOLOGIES WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure

More information

Analysis, Simulations and Improvement Proposals of IEEE g-2012

Analysis, Simulations and Improvement Proposals of IEEE g-2012 Analysis, Simulations and Improvement Proposals of IEEE 802.15.4g-2012 Master s thesis in Communication Engineering LIANG XUE Department of Signals and Systems Chalmers University of Technology Gothenburg,

More information

Zigbee protocol stack overview

Zigbee protocol stack overview Zigbee protocol stack overview 2018 ASSUMPTIONS FOR USING THIS TEACHING MATERIAL DSR and OTSL takes no responsibility about the problem which occurs as a result of applying the technical information written

More information

Delay Performance Evaluation of WIFI Release (IEEE a, b, g and n) Using OPNET for Data Types (Voice, , File Transfer, Video Convergence)

Delay Performance Evaluation of WIFI Release (IEEE a, b, g and n) Using OPNET for Data Types (Voice,  , File Transfer, Video Convergence) Delay Performance Evaluation of WIFI Release (IEEE 802.11 a, b, g and n) Using OPNET for Data Types (Voice, email, File Transfer, Video Convergence) Amel Aboud Ali mohamed Alswelih 1 and Dr. Amin Babiker

More information

RESOURCES. By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011

RESOURCES. By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011 Moving Beyond Zigbee for Star Networks RESOURCES By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011 Multi-hop mesh protocols, such as Zigbee, are getting

More information

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs IT220 Network Standards & Protocols Unit 6: Chapter 6 Wireless LANs 2 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of

More information

Co-Existence of WirelessHART with other Wireless Technologies

Co-Existence of WirelessHART with other Wireless Technologies Co-Existence of WirelessHART with other Wireless Technologies HCF_LIT-122 Rev. 1.0 Date of Publication: March 9, 2010 Contributors: Gareth Johnston, ABB; Jim Cobb, Emerson Process Management; Eric Rotvold,

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Experimental Study on Co-existence of b with Alien Devices

Experimental Study on Co-existence of b with Alien Devices Experimental Study on Co-existence of 8.b with Alien Devices Javier del Prado and Sunghyun Choi Philips Research Briarcliff USA, Briarcliff Manor, New York Email: {javier.delprado,sunghyun.choi}@philips.com

More information

Internet Structure. network edge:

Internet Structure. network edge: Midterm Review Internet Structure network edge: Hosts: clients and servers Server often in data centers access networks, physical media:wired, wireless communication links network core: interconnected

More information

1. IEEE and ZigBee working model.

1. IEEE and ZigBee working model. ZigBee SoCs provide cost-effective solutions Integrating a radio transceiver, data processing unit, memory and user-application features on one chip combines high performance with low cost Khanh Tuan Le,

More information

Chapter 10: Wireless LAN & VLANs

Chapter 10: Wireless LAN & VLANs Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Comparative Analysis of ZigBee, WLAN and Bluetooth System and its Throughput Enhancement

Comparative Analysis of ZigBee, WLAN and Bluetooth System and its Throughput Enhancement Comparative Analysis of ZigBee, WLAN and Bluetooth System and its Throughput Enhancement Ms. Hina Dhiman Dept. of Electronics and Telecommunication Sinhgad College of Engineering Pune, India Prof. Mrs.

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

outline background & overview mac & phy wlan management security

outline background & overview mac & phy wlan management security IEEE 802.11a/g WLAN outline background & overview mac & phy wlan management security WLAN benefits flexibility & mobility installation scalability disadvantages distance security performance IEEE 802.11a

More information

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online 1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

HIPERLAN/2 and a: A Comparative Study

HIPERLAN/2 and a: A Comparative Study HIPERLAN/2 and 802.11a: A Comparative Study PADMA BONDE Reader, Department of Computer Science Shri Vaishnav Institute of Technology and Science Indore, INDIA JAYESH BONDE Executive Engineer, Department

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction to IEEE 802.11 Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master

More information

A cluster based interference mitigation scheme for performance enhancement in IEEE

A cluster based interference mitigation scheme for performance enhancement in IEEE 756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -

More information

Experimental Testing of Wireless Sensors Network Functionality

Experimental Testing of Wireless Sensors Network Functionality Journal of Automation and Control, 2015, Vol. 3, No. 3, 53-57 Available online at http://pubs.sciepub.com/automation/3/3/2 Science and Education Publishing DOI:10.12691/automation-3-3-2 Experimental Testing

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

Converged Access: Wireless AP and RF

Converged Access: Wireless AP and RF This chapter describes the best recommendation or practices of Radio Resource Management (RRM), beam forming, Fast SSID, and Cisco CleanAir features. The examples provided in this chapter are sufficient

More information

Wireless LAN USB Super G 108 Mbit. Manual

Wireless LAN USB Super G 108 Mbit. Manual Wireless LAN USB Super G 108 Mbit Manual Dear Customer, Thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we kindly

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

WLAN b/g interference into ZigBee networks

WLAN b/g interference into ZigBee networks WLAN 802.11 b/g interference into ZigBee networks by Guang Yang Yu Yu Master Thesis in Information and Communication Technology Supervisor: Magne Arild Haglund Agder University 2008.05 Abstract Abstract

More information

Matteo Petracca Scuola Superiore Sant Anna, Pisa

Matteo Petracca Scuola Superiore Sant Anna, Pisa Wireless stack and protection techniques Matteo Petracca Scuola Superiore Sant Anna, Pisa Basic Computing Theory and Practice in WSNs Scuola Superiore Sant Anna, Pisa June 21th 2010 Outline Introduction

More information